home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Columbia Kermit
/
kermit.zip
/
newsgroups
/
misc.20031118-20041115
/
000188_jaltman2@nyc.rr.com_Mon Apr 12 09:36:23 2004.msg
< prev
next >
Wrap
Internet Message Format
|
2020-01-01
|
2KB
Path: newsmaster.cc.columbia.edu!iad-feed.news.verio.net!peer1.stngva01.us.to.verio.net!news.verio.net!newsfeed.icl.net!newsfeed.fjserv.net!newsfeed.icl.net!newshosting.com!nx02.iad01.newshosting.com!167.206.3.103.MISMATCH!news3.optonline.net!cyclone.rdc-nyc.rr.com!news-out.nyc.rr.com!twister.nyc.rr.com.POSTED!not-for-mail
Message-ID: <407A990B.3040105@nyc.rr.com>
From: Jeffrey Altman <jaltman2@nyc.rr.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7b) Gecko/20040316
X-Accept-Language: en-us, en
MIME-Version: 1.0
Newsgroups: comp.protocols.kermit.misc
Subject: Re: FTP with Auth SSL
References: <c5bv8301ck0@drn.newsguy.com> <GWfec.23377$Nn4.4630542@twister.nyc.rr.com> <c5clci0adl@drn.newsguy.com> <407A073D.7040004@nyc.rr.com> <c5d66301vto@drn.newsguy.com>
In-Reply-To: <c5d66301vto@drn.newsguy.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 23
Date: Mon, 12 Apr 2004 13:21:22 GMT
NNTP-Posting-Host: 24.193.46.55
X-Complaints-To: abuse@rr.com
X-Trace: twister.nyc.rr.com 1081776082 24.193.46.55 (Mon, 12 Apr 2004 09:21:22 EDT)
NNTP-Posting-Date: Mon, 12 Apr 2004 09:21:22 EDT
Organization: Road Runner - NYC
Xref: newsmaster.cc.columbia.edu comp.protocols.kermit.misc:14901
Petri wrote:
>>A firewall is dropping the connection after the initial client
>>hello is sent.
>
>
> There are no firewalls passed in the session above.
> In fact, it is run against localhost.
> If I instead use the local ftp client of redhat 9, it works.
> If I connect with any ftp client (except kermit) from remote hosts, it works.
Does the local ftp client support AUTH TLS or AUTH SSL?
Does the local ftp client default to PASSIVE mode?
Does the local ftp client encrypt the DATA channel?
Kermit is negotiating the command channel SSLv3 session just fine.
When it attempts to negotiate the data channel SSLv3 session it sends
a request to the server looking to reuse the existing session. The
SSLv3 client hello message is sent and the socket becomes invalid.
The socket is being closed. If this is not from a firewall, another
possibility is that the ftpd is core dumping.